CVE-2021-24750

The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp_visitor_statistics_\(real_time_traffic\)_project:wp_visitor_statistics_\(real_time_traffic\):*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165433/WordPress-WP-Visitor-Statistics-4.7-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://plugins.trac.wordpress.org/changeset/2622268 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2622268 - Patch, Third Party Advisory
References () https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/7528aded-b8c9-4833-89d6-9cd7df3620de - Exploit, Third Party Advisory

Information

Published : 2021-12-21 09:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24750

Mitre link : CVE-2021-24750

CVE.ORG link : CVE-2021-24750


JSON object : View

Products Affected

wp_visitor_statistics_\(real_time_traffic\)_project

  • wp_visitor_statistics_\(real_time_traffic\)
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')